EP4295225A1 - Procédé et système d'activation d'une analyse de carte de circuit imprimé utilisant des données de capacité de fabrication - Google Patents

Procédé et système d'activation d'une analyse de carte de circuit imprimé utilisant des données de capacité de fabrication

Info

Publication number
EP4295225A1
EP4295225A1 EP21926406.6A EP21926406A EP4295225A1 EP 4295225 A1 EP4295225 A1 EP 4295225A1 EP 21926406 A EP21926406 A EP 21926406A EP 4295225 A1 EP4295225 A1 EP 4295225A1
Authority
EP
European Patent Office
Prior art keywords
dfm
tenant
profile
envelop
account
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
EP21926406.6A
Other languages
German (de)
English (en)
Inventor
Max Clark
Alex ZIGELBOIM
Keren PARYENTI
Tal Zur
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Siemens Industry Software Inc
Original Assignee
Siemens Industry Software Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Siemens Industry Software Inc filed Critical Siemens Industry Software Inc
Publication of EP4295225A1 publication Critical patent/EP4295225A1/fr
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F30/00Computer-aided design [CAD]
    • G06F30/30Circuit design
    • G06F30/39Circuit design at the physical level
    • G06F30/398Design verification or optimisation, e.g. using design rule check [DRC], layout versus schematics [LVS] or finite element methods [FEM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2111/00Details relating to CAD techniques
    • G06F2111/02CAD in a network environment, e.g. collaborative CAD or distributed simulation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2115/00Details relating to the type of the circuit
    • G06F2115/12Printed circuit boards [PCB] or multi-chip modules [MCM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2119/00Details relating to the type or aim of the analysis or the optimisation
    • G06F2119/18Manufacturability analysis or optimisation for manufacturability

Definitions

  • the present disclosure is directed, in general, to computer-aided systems for Printed Circuit Board (“PCB”) design and their manufacturability analysis. More in particular, the disclosure is directed to software systems and applications for Design for Manufacturability (“DFM’) analysis in the field of PCB manufacturing.
  • PCB Printed Circuit Board
  • DFM Design for Manufacturability
  • DFM analysis software tools typically enable to run a manufacturing capability analysis of a PCB layout design on a selected manufacturer’s DFM profile.
  • DFM profile denotes a set of constraints and rules of manufacturing capabilities expected from a manufacturer, usually in form of a bound of files.
  • a DFM profile may be for example a “generic” one for a generic standard PCB manufacturer or a specific one provided by a specific selected PCB manufacturer.
  • PCB manufacturing companies may provide their own DFM profiles on their own manufacturing capabilities to be shared exclusively with their own customers e.g. PCB designers and/or OEM companies.
  • PCB collaborative network may nowadays be implemented by means of a variety of software applications deployed in a mixed cloud and on-premise platform, where, for example, manufacturers share their own DFM profiles in a cloud data layer via a Software as a Service (“SaaS”) and where designers are enabled to run their own DFM analysis applications against DFM profiles downloaded on their premises.
  • SaaS Software as a Service
  • manufacturers upload their DFM profiles into the cloud and designers may request the cloud the authorization to download a selected DFM profile into their file systems on their premises in order to perform a local DFM analysis via their DFM analysis software tools.
  • Various disclosed embodiments include methods, systems, and computer readable mediums for activating a PCB analysis utilizing manufacturing capability data shared in a multi-tenant collaborative network in a mixed cloud and on-premise environment.
  • a method includes providing access to a tenant’s account of a DFM application deployed on a tenant’s premise, said DFM application being enabled to activate a PCB analysis on a DFM profile comprising manufacturing capability data.
  • the method further includes requesting to a cloud data layer, via the tenant’s account, an utilization authorization of a given DFM profile stored in the cloud data layer.
  • the method further includes, in case of authorized utilization, downloading, into the premise, the given DFM profile embedded in a locked envelope, hereinafter called DFM envelope; the DFM envelope being generated by locking together the given DFM profile with an injected identifier identifying said authorized tenant’s account.
  • the method further includes, via the DFM application when logged into the tenant’s account, activating a PCB analysis by permitting the unlocking of the DFM profile from the DFM envelope only when the identifier of the tenant’s account is the same as the injected identifier.
  • Figure 1 illustrates a block diagram of a data processing system in which an embodiment can be implemented.
  • Figure 2 illustrates a block diagram of a mixed cloud and premise collaborative platform in accordance with disclosed embodiments.
  • Figures 3A, 3B and 3C illustrate sequence diagrams for controlled sharing of a DFM profile in accordance with disclosed embodiments.
  • Figure 4 illustrates a flowchart of a method for activating a PCB analysis utilizing manufacturing capability data in accordance with disclosed embodiments.
  • FIGURES 1 through 4 discussed below, and the various embodiments used to describe the principles of the present disclosure in this patent document are by way of illustration only and should not be construed in any way to limit the scope of the disclosure. Those skilled in the art will understand that the principles of the present disclosure may be implemented in any suitably arranged device. The numerous innovative teachings of the present application will be described with reference to exemplary non-limiting embodiments.
  • Embodiments ensure that a DFM profile downloaded into a premise of a given authorized party can be utilized exclusively by this specific authorized party.
  • Embodiments prevent utilization of downloaded DFM profiles by no other party different than the authorized one in the cloud. [0023] Embodiments prevent propriety data abuse by guarantying that the cloud sharing of manufacturing proprietary capability data is done exclusively with the authorized party.
  • Embodiments enable manufacturers to control and select which designer(s) among a pool of designers are authorized to download and use a selection of their own cloud-uploaded DFM profiles.
  • Other embodiments enable manufacturers to control and select which designer(s) among a pool of designers are authorized to download, use and/or view and/or even modify a selection of their own cloud-uploaded DFM profiles.
  • Embodiments enable to implement an access control mechanism restricting DFM profile usage to one selected specific party.
  • Embodiments encourages manufacturers to collaborate in a PCB design network by sharing in the cloud their PCB manufacturing capability data with their selected authorized designers in a secure manner.
  • Embodiments enable manufacturers to manage the sharing of their own cloud- uploaded DFM profiles in a controlled manner. [0028] Embodiments enable a controlled selective networking for PCB manufacturing data collaboration.
  • Embodiments generate a cooperative network among different parties in the PCB industry, i.e. one or more PCB manufacturers and one or more PCB designers, without putting the confidentiality of the proprietary manufacturing capability data at risk. [0030] With embodiments, reliable PCB manufacturing design collaboration channels are advantageously created.
  • Embodiments apply to PCB design software applications in the PCB cloud applications domain in a mixed platform of cloud/SaaS and on-premise/client applications.
  • Embodiments foster a thrustful manufacturing capability data sharing environment between SaaS parties, i.e. the PCB manufacturers and the PCB designers.
  • Embodiments provide a cloud network solution to on-premise clients enabling exclusive data sharing capabilities. [0034] Embodiments ensure exclusive utilization of DFM data downloaded from the cloud into the premise to be used (or even seen or even modified) by a DFM application.
  • Embodiments enable on-premises DFM applications of receiving real-time manufacturability rules directly from the cloud in a controlled manner.
  • every user of the authorized tenant’s account can conveniently activate a DFM analysis on that file, independently from the machine she/he is working on.
  • FIG. 1 illustrates a block diagram of a data processing system 100 in which an embodiment can be implemented, for example as a PDM system particularly configured by software or otherwise to perform the processes as described herein, and in particular as each one of a plurality of interconnected and communicating systems as described herein.
  • the data processing system 100 illustrated can include a processor 102 connected to a level two cache/bridge 104, which is connected in turn to a local system bus 106.
  • Local system bus 106 may be, for example, a peripheral component interconnect (PCI) architecture bus. Also connected to local system bus in the illustrated example are a main memory 108 and a graphics adapter 110. The graphics adapter 110 may be connected to display 111.
  • PCI peripheral component interconnect
  • Peripherals such as local area network (LAN) / Wide Area Network / Wireless (e.g . WiFi) adapter 112, may also be connected to local system bus 106.
  • Expansion bus interface 114 connects local system bus 106 to input/output (I/O) bus 116.
  • I/O bus 116 is connected to keyboard/mouse adapter 118, disk controller 120, and I/O adapter 122.
  • Disk controller 120 can be connected to a storage 126, which can be any suitable machine usable or machine readable storage medium, including but are not limited to nonvolatile, hard-coded type mediums such as read only memories (ROMs) or erasable, electrically programmable read only memories (EEPROMs), magnetic tape storage, and user-recordable type mediums such as floppy disks, hard disk drives and compact disk read only memories (CD-ROMs) or digital versatile disks (DVDs), and other known optical, electrical, or magnetic storage devices.
  • ROMs read only memories
  • EEPROMs electrically programmable read only memories
  • CD-ROMs compact disk read only memories
  • DVDs digital versatile disks
  • Audio adapter 124 Also connected to EO bus 116 in the example shown is audio adapter 124, to which speakers (not shown) may be connected for playing sounds.
  • Keyboard/mouse adapter 118 provides a connection for a pointing device (not shown), such as a mouse, trackball, trackpointer, touchscreen, etc.
  • a data processing system in accordance with an embodiment of the present disclosure can include an operating system employing a graphical user interface.
  • the operating system permits multiple display windows to be presented in the graphical user interface simultaneously, with each display window providing an interface to a different application or to a different instance of the same application.
  • a cursor in the graphical user interface may be manipulated by a user through the pointing device. The position of the cursor may be changed and/or an event, such as clicking a mouse button, generated to actuate a desired response.
  • LAN/ WAN/Wireless adapter 112 can be connected to a network 130 (not a part of data processing system 100), which can be any public or private data processing system network or combination of networks, as known to those of skill in the art, including the Internet.
  • Data processing system 100 can communicate over network 130 with server system 140, which is also not part of data processing system 100, but can be implemented, for example, as a separate data processing system 100.
  • Figure 2 illustrates a block diagram of a mixed cloud and premise collaborative platform in accordance with disclosed embodiments.
  • each of the three parties 241, 242, 243 of the collaboration network has its own client software application 211, 212, 213 residing in an own local machine 221, 222, 223 on an own premise.
  • the first two client applications 211, 212 are able to exchange data with a data layer located in the cloud 201 where Software as a Service (“SaaS”) applications form a collaborative controlled network in the PCB manufacturing domain.
  • SaaS Software as a Service
  • the first party 241 is a PCB manufacturer and the second party 242 and the third party 243 are two different PCB designers, e.g. customer companies of the PCB manufacturer 241.
  • the term “party” may denote a company, e.g. a manufacturer or a designing company, or any user belonging to this same company and able to log herself/himself into the company’s tenant account.
  • the client application 212, 213 is a DFM analysis tool for the designers and a DFM profile editor 211 for the manufacturer, where the DFM profile editor 211 of the manufacturer 241 is compatible with the DFM analysis applications 212,213 of the designers 242, 243.
  • the designers 242, 243 may use a stand-alone DFM analysis tool 212, 213 and the manufacturer 241 may utilize a reduced version 211 of the designer’s application.
  • the three client applications 211, 212, 213 are the same DFM analysis application.
  • the three client applications 211, 212, 213 may be the same applications or compatible ones, for example different versions, lighter versions etc., or any mix thereof.
  • At least one of the client applications 211, 212, 213 is a component or a submodule of a DFM application residing on the premise. In embodiments, at least one of the three client applications 211, 212, 213 is enabled to run a DFM analysis directly. In embodiments, the DFM analysis is performed on the premise. In embodiments, at least one of the three client applications 211, 212, 213 is enabled to run a DFM analysis indirectly by activation of a DFM analysis tool which can be partially of fully located on the premise or on the cloud. In embodiments, the client application requires a logging into the tenant’s account in the cloud. Examples of DFM analysis tools 212, 213 include, but are not limited by, Valor PCB Manufacturing solutions, vNPI software solutions, PCBflow software solutions of Siemens Digital Industries Software Corporation.
  • the manufacturer 241 uploads 250 via its own client application 211 its manufacturing capability data 205 into the cloud 201 for collaboration purposes.
  • the manufacturing capability data 205 have previously been encrypted by an encryption algorithm present in the client application 211.
  • the manufacturer 241 uploads the encrypted data 205 into the cloud 201 and sets the party authorization.
  • the manufacturer 241 authorizes designer 242 to use its own manufacturing capability data for DFM analysis purposes.
  • the manufacturing capability data are the manufacturer’s DFM profile 205.
  • the manufacturer 241 may set other party authorizations beside “data usage” for example “data viewing capability” and/or “data modification capabilities”, all such party authorization capabilities may conveniently be stored as “party authorization data” stored together with the manufacturing capability data.
  • the first designer 242 via its own tenant account, requests (not shown) the cloud an authorization to use or to perform other authorized actions on the DFM 205 profile of the manufacturer 241.
  • the authorization check (not shown) is performed in the cloud 201.
  • the authorization check is a collaboration check which can be for example performed via the protocol JSON Web Token (“JWT”).
  • the authorization check is then successful and the client application 212 receives 251 the encrypted DFM profile 205 from the cloud 201.
  • the client application 212 injects into the received data the authorized customer tenant identifier (“ID”), then it encrypts the data and saves 262 it into the file system 232 as a DFM envelop file 206.
  • the DFM envelop 206 comprises at least a DFM profile 205 and an injected tenant ID.
  • the DFM envelop generation is performed (not shown) in the cloud 201 and the client application 212 receives the DFM profile 206 already embedded into the DFM envelop file 206 with the injected ID of its tenant.
  • the DFM envelop is uploaded 263 and a check is performed by comparing whether the tenant’s ID injected in the data is identical to the ID of the client application tenant’s account. Only if they are identical, the DFM profile data can be unlocked from the DFM envelop 206 and utilized, also according to the stored authorizations types, for DFM analysis purposes. In this case, the DFM analysis can be performed.
  • this first authorized designer 241 sends 271 the DFM envelop 206 to the second designer 243 via some file transport means, for example via Email and then the second designer 243 saves 272 the received DFM envelop 206 in the own file system 233 in the own local machine 223.
  • the client application 213 checks whether the tenant ID injected in the data is identical to its own tenant ID. Only if they are identical the DFM envelop 206 can be used the client application 213. In this case the DFM analysis cannot be performed because in the DFM envelop 206 the injected tenant ID is different than the ID of the tenant’ s account.
  • the client application 212,213 loads the encrypted DFM envelop fde 206 from the file system 232, 233, it decrypt the file, it extracts the tenant ID an compares it to the logged in user’s tenant ID. If it is equal, i.e. a valid user, then the client application continues to handle the file by extracting the DFM profile 205 for activating a DFM analysis. If it is not equal, invalid user, then the client application rejects it and stops to handle it.
  • the DFM profile 205 data shared in the cloud 201 can be used only by the designer 242 that was authorized for its download and specific use type.
  • tenant account denotes a logical entity with unique ID also called tenant ID typically representing all the users in this tenant and, optionally, some other tenant’s information such as tenant log, tenant name etc.
  • tenant ID typically representing all the users in this tenant
  • tenant name typically represents all the users in this tenant
  • tenant name typically represents all the users in this tenant
  • tenant name typically represents all the users in this tenant and, optionally, some other tenant’s information such as tenant log, tenant name etc.
  • a user who wishes to work on behalf of her/his tenant performs a log-in process against the cloud account.
  • the login process is done preferably from the premise application. In other embodiments, the login process is done directly in the cloud.
  • the premise application does not have a log-in into it and the account is on the cloud only.
  • the premise application asks the user to login to the cloud and get permissions from the cloud.
  • the received credentials include some user details, e.g. user’s email, username, and tenant account details, e.g. tenant’s ID.
  • the received tenant’s ID is used to generate the DFM envelop.
  • the DFM envelop is saved in the file system on the premise and can be unlocked by different users as long as such users belong to the same authorized tenant account of the tenant’s ID injected within the file.
  • such users may be working on any other desired different machine on any device, on any hardware and can get the DFM profile on their file system for activating their DFM analysis.
  • a DFM analysis can be run by users logged into the authorized tenant’s account on any machine or device, including a smartphone or a tablet and at any point of time.
  • the DFM profile file can be used independently from the machine type.
  • the DFM envelop can conveniently be used only by a client application with a logged tenant’s account corresponding to the tenant ID previously injected into the DFM envelop.
  • access tokens may conveniently be used.
  • a communication protocol which can be used for securely conveying 251 the tenant information to the client application may be JWT.
  • encryption mechanisms of the client applications may advantageously be utilized.
  • an encryption algorithm to be used is the encryption algorithm available inside the local application 212 for decrypting and re-encrypting, into the DFM envelop 206, the download DFM profile 205 together with the Unique tenant ID extracted from the JWT token.
  • the step of locking the DFM profile by injecting the tenant’s ID into a generated DFM envelop file may preferably be done at the premise, for example by the client application. In other embodiments, the step of locking the DFM profile by injecting the tenant’s ID into a generated DFM envelop file may be done in the cloud by the SaaS application.
  • the premise application receives data on the DFM profile and data on the tenant’s account ID and generates with such data the DFM envelop.
  • the tenant ID is injected into the data in encrypted manner by the SAAS side just before it sends it to the authorized party.
  • the tenant ID can be used as part of the encrypted/decrypted key.
  • the tenant ID can be injected within the encryption key.
  • the general key that it used for all customers/parties can be mixed with the tenant ID, e.g hash function.
  • embodiments guarantee a unique encryption key per tenant.
  • the data is advantageously kept unaltered given that the tenant ID is not injected into the data.
  • the authorized user's tenant ID is checked while using the data in order to ensure that such data can be used.
  • the manufacturer 241 uploads 250 the DFM profile 205 via its own premise application 211 and sets in its own cloud account the authorization for a selected designer 242.
  • the manufacturer 241 is provided with the capability of encrypting its own DFM profile via its own premise application 211, where such encryption mechanism is compatible with the encryption mechanism of the designer’s premise application 212, 213.
  • the manufacturer 241 is provided with the capability of setting in the cloud 201 an exclusive collaboration with a specific designer via its own cloud account (not shown). Through its own cloud account, the manufacturer can select a pool of designers to share some of its proprietary DFM profiles with. In embodiments, the manufacturer is enabled to select which designer is additionally enabled to view some data of the DFM profile. In embodiments, the manufacturer can set its own preferences and can expose in the cloud data interface the sharing authorizations of its own DFM profiles with a pool of designers. The sharing authorizations regard the manufacturing capability data utilization and optionally the viewing of such data. Conveniently, embodiments guarantee that the shared data are not fully disclosed even to an authorized party. In embodiments, the designer, upon request, gets a list of the DFM profiles 205, its users can utilize or partially/fully view.
  • Figures 3A, 3B and 3C illustrate sequence diagrams for controlled sharing of a DFM profile in accordance with disclosed embodiments.
  • FIG. 3A illustrates the first phase where the manufacturer M uploads its proprietary DFM profile to the SaaS application and sets authorization sharing for the first designer Dl; in the second phase, the first designer Dl connects to the SaaS application, downloads the shared DFM profile embedded in a DFM envelop with its own tenant’s ID and uses it for DFM analysis; and, in the third phase, the first designer Dl sends the DFM envelop to the second designer D2 who is then unable to utilize the embedded DFM profile for DFM analysis (in the figure)
  • the sequence diagram of Figure 3A illustrates the first phase where the manufacturer 301 uploads its proprietary DFM profile to the SaaS application 303 and sets authorization sharing for the designer Dl.
  • the manufacturer 301 encrypts its own DFM profile via its own premise application “OnPremApp” 302 via the following exemplary actions:
  • the encryption is preferably done via the internal encryption solution of the premise application “OnPremApp” 302, advantageously such DFM profile may then be loaded only via another premise application “OnPremApp” 302 able to decrypt the DFM profile.
  • the encrypted DFM profile is then uploaded on the SaaS application 303 and authorized for usage by the first designer Dl via the following exemplary actions:
  • the SaaS application stores the collaboration details between the manufacturer M and the first designer Dl so that only designer Dl is authorized for use.
  • the action of “set sharing with the first designer Dl” and the action of “set exclusive collaboration between manufacturer M and the fist designer Dl” may conveniently be directly performed in the SaaS 303 together with the action “it updates networking service” 311.
  • FIG. 3B The sequence diagram of Figure 3B illustrates the second phase where the first designer 321 connects to the SaaS application 303, downloads the DFM profile, embeds it into a DFM envelop and then uses it for DFM analysis via the following exemplary actions:
  • the action of “it verifies the DFM envelop” and the action of “working on it” may conveniently be performed in one stage.
  • the DFM profile locked in the DFM envelop file cannot be used via the premise application OnPremApp by any other designer other than the authorized designer.
  • FIG. 3C illustrates the third phase where the first designer D1 sends the DFM envelop to the second designer D2 who is then unable to utilize the embedded DFM profile for DFM analysis via the following exemplary actions: - “Hi pal, get this DFM envelop” 343, where action 343 of sending the DFM envelop goes from the first designer 321 to the second designer 341; for example, the DFM envelop file may be sent via any channel, e.g. via Email;
  • manufacturers are able to share their own manufacturing capabilities with their own customers in a controlled and a safe manner.
  • Figure 4 illustrates a flowchart 400 of a method for activating a PCB analysis utilizing manufacturing capability data in accordance with disclosed embodiments. Such method can be performed, for example, by system 100 of Figure 1 described above, but the “system” in the process below can be any apparatus configured to perform a process as described.
  • the manufacturing capability data is preferably shared in a multi-tenant collaborative network in a mixed cloud and on-premise environment.
  • the tenant’s account via the tenant’s account, it is requested to a cloud data layer an utilization authorization of a given DFM profile stored in the cloud data layer.
  • the utilization authorization is performed as a cloud collaboration request.
  • the given DFM profile embedded in a locked envelope hereinafter called DFM envelope; the DFM envelope being generated by locking together the given DFM profile with an injected identifier identifying said authorized tenant’s account.
  • the DFM envelop is generated by the DFM application.
  • the DFM envelop is generated within the cloud.
  • DFM envelop may include, beside the injected tenant ID, other data like the address, the name etc.
  • the DFM envelop is generated by performing the following sub- steps: - in case of encrypted DFM profile, decrypting the DFM profile
  • the DFM envelop is generated by injecting the tenant ID within the encryption key.
  • the DFM envelop is generated by performing the following sub- steps:
  • An exemplary algorithm embodiment comprise the following steps: downloading of the data, wherein the SAAS service makes sure to send the manufacturing capability data only to an authorized tenant and wherein the client application injects the tenant ID into the data and encrypt it as a data envelop before saving into the file system; and, processing of the data: wherein the client application decrypts the data, compares the tenant ID inside the data with the one belonging to the using tenant and only if they are identical it allows the processing of the data for DFM analysis purposes.
  • the party cannot decrypt and use the manufacturing data independently
  • the manufacturing capability data can advantageously be utilized only through the DFM client application
  • the DFM client application can activate or perform a DFM analysis by on the unlocked DFM profile data.
  • machine usable/readable or computer usable/readable mediums include: nonvolatile, hard-coded type mediums such as read only memories (ROMs) or erasable, electrically programmable read only memories (EEPROMs), and user-recordable type mediums such as floppy disks, hard disk drives and compact disk read only memories (CD-ROMs) or digital versatile disks (DVDs).
  • ROMs read only memories
  • EEPROMs electrically programmable read only memories
  • user-recordable type mediums such as floppy disks, hard disk drives and compact disk read only memories (CD-ROMs) or digital versatile disks (DVDs).

Abstract

L'invention concerne des systèmes et un procédé d'activation d'une analyse de PCB utilisant des données de capacité de fabrication partagées dans un réseau collaboratif à locataires multiples dans un environnement mixte en nuage et sur site. L'invention concerne également l'accès à un compte d'un locataire d'une application DFM déployée sur le local d'un locataire. L'application DFM est activée pour activer une analyse PCB sur un profil DFM comprenant des données de capacité de fabrication. Par l'intermédiaire du compte de l'occupant, une couche de données en nuage est demandée à une autorisation d'utilisation d'un profil DFM donné stocké dans la couche de données en nuage. En cas d'utilisation autorisée, le profil DFM donné est téléchargé dans le site, intégré dans une enveloppe DFM verrouillée, appelée ci-après enveloppe DFM. L'enveloppe DFM est réalisée par verrouillage ensemble du profil DFM donné avec un identifiant injecté identifiant ledit compte de locataire autorisé. Par l'intermédiaire de l'application DFM lorsqu'il est enregistré dans le compte du locataire, une analyse de PCB est activée en permettant le déverrouillage du profil DFM à partir de l'enveloppe DFM uniquement lorsque l'identifiant du compte du locataire est le même que l'identifiant injecté.
EP21926406.6A 2021-02-16 2021-02-16 Procédé et système d'activation d'une analyse de carte de circuit imprimé utilisant des données de capacité de fabrication Pending EP4295225A1 (fr)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/IB2021/051288 WO2022175705A1 (fr) 2021-02-16 2021-02-16 Procédé et système d'activation d'une analyse de carte de circuit imprimé utilisant des données de capacité de fabrication

Publications (1)

Publication Number Publication Date
EP4295225A1 true EP4295225A1 (fr) 2023-12-27

Family

ID=82932135

Family Applications (1)

Application Number Title Priority Date Filing Date
EP21926406.6A Pending EP4295225A1 (fr) 2021-02-16 2021-02-16 Procédé et système d'activation d'une analyse de carte de circuit imprimé utilisant des données de capacité de fabrication

Country Status (3)

Country Link
EP (1) EP4295225A1 (fr)
CN (1) CN117043744A (fr)
WO (1) WO2022175705A1 (fr)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117391042B (zh) * 2023-12-08 2024-03-12 青岛鼎信通讯股份有限公司 一种基于dfx设计执行系统的pcb版图分析方法

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7003477B2 (en) * 2002-03-01 2006-02-21 Phillip Zarrow Certification method for manufacturing process
US7702636B1 (en) * 2002-07-31 2010-04-20 Cadence Design Systems, Inc. Federated system and methods and mechanisms of implementing and using such a system
US9792405B2 (en) * 2013-01-17 2017-10-17 Edico Genome, Corp. Bioinformatics systems, apparatuses, and methods executed on an integrated circuit processing platform
US9582034B2 (en) * 2013-11-29 2017-02-28 Motiv, Inc. Wearable computing device

Also Published As

Publication number Publication date
WO2022175705A1 (fr) 2022-08-25
CN117043744A (zh) 2023-11-10

Similar Documents

Publication Publication Date Title
US10911226B2 (en) Application specific certificate management
US11075893B2 (en) Cryptographic proxy service
EP3375161B1 (fr) Gestion d'identité pour ouverture de session unique entre des systèmes locaux et distants
US11196729B2 (en) Methods and systems for distributing encrypted cryptographic data
US11108825B2 (en) Managed real-time communications between user devices
US9942242B2 (en) Content access for duration of calendar events
KR101816863B1 (ko) 기업 시스템들에서 사용자 및 디바이스 인증
US20190228144A1 (en) User device authentication
US20140075513A1 (en) Device token protocol for authorization and persistent authentication shared across applications
US20180294980A1 (en) Management of secret data items used for server authentication
US20140189346A1 (en) License server manager
CN102893575B (zh) 借助于ipsec和ike第1版认证的一次性密码
WO2018052754A1 (fr) Contrôle d'accès par l'intermédiaire de structures de données
WO2022175705A1 (fr) Procédé et système d'activation d'une analyse de carte de circuit imprimé utilisant des données de capacité de fabrication
US20220329577A1 (en) Two-Factor Authentication to Authenticate Users in Unconnected Devices
JP5623326B2 (ja) クライアントサーバシステム
Harisha et al. Open Standard Authorization Protocol: OAuth 2.0 Defenses and Working Using Digital Signatures

Legal Events

Date Code Title Description
STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE

PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE

17P Request for examination filed

Effective date: 20230822

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR